Sciweavers

509 search results - page 71 / 102
» End-to-End Web Application Security
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik

Publication
148views
13 years 10 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
WWW
2009
ACM
14 years 9 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
IWSEC
2007
Springer
14 years 2 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
MOBISYS
2008
ACM
14 years 8 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...